Phishing emails are one of the most significant issues rising over the past year. it can deliver ransomware and other hazardous threats to businesses and enterprises of all sizes. Many advanced phishing emails […]

In the case of cybersecurity, fire must be fought with fire, or in this case, with automation. Companies must seek out and enforce preventative solutions that use automated methods of prevention. One such technology that preventatively protects companies and enterprises of all sizes is the Content Disarm and Reconstruction technology (CDR). CDR technology processes incoming files, analyzes and breaks down the content structure, then rebuilds a duplicate file with no loss of functionality – all in real-time. Through this process, end-users are able to receive any file, free of both known and unknown threats because CDR removes any content that is not approved by the organization. Machine learning is still in its early phases and phishing will only become more insidious as the technology matures and the process becomes even more automated.

The article I read for this week is about a windows, android malware exploited by a cyberespionage group to target organizations in the Middle East. According to the security firms, the group uses Windows and […]

The threat was discovered in the mid of January this year when it was targeting multiple owners of Github repositories via phishing emails, but cyber-security firm Palo Alto, who reported the campaign on Tuesday, […]

Really interesting post, Sarush, I am not an Instagram user but I’m surprised that it took them so long to add that valuable security feature to protect the users. Two-facter authentication is effective to deter hackers because hackers would spend time to hack an account when they know a secondary token is going to be needed. However, at the same…[Read more]

Talking about the use of Big data in cybersecurity, it can help the government setting with a number of high-profile use case examples, how the internet-of-things(IoT) is taking a firm hold in helping government […]

To add to your post Yu Ming, these days big data techniques used to mine databases are being adopted by the military to glean more information from many different types of data it collects—from drones, automated cybersecurity systems, terrorist databases and many other sources which is helpful in performing military operations and hence is becoming a useful technology.

The biological national security is facing a dramatic issue and it may be ripped from the page because American pharmaceutical companies and the health-care sector are not doing enough to secure biological […]

According to the Symantec research, it showed that many workers are not aware of the security risks associated with using their own devices for business. This can expose IT and indeed the whole business to risks. […]

Very interesting article Ming, Trade-based money laundering is one of the most sophisticated methods of cleaning dirty money. Since you mentioned about invoicing for goods and services. Multiple invoicing is one of the most common method of TBML, which allows money launderers to receive multiple payments for the same product. I think ACL is one of…[Read more]

Detecting the Undetectable
This week, I read this article “Detecting the Undetectable” from Info-security magazine. Since modern breaches mostly involve a mix of chameleonic deception and clever automation, ena […]

I like your article Yu Ming. In light of the fact that attacks are increasingly evolved and sophisticated, the reality is there is no longer a one size fits all approach to security. To defend against the modern cyber threat, organizations need a multiple-faced approach, and not to fall into the trap of implementing one measure. Those automated antivirus software or controls can easily be bypassed, which means that we need to think about defence-in-depth and monitoring-in-depth strategies to detect the undetectable.

Bringing in millennials to the work place is beneficial for the organization because they can bring in new ideas in an advanced technology perspective. Embracing IT allow businesses to grow and expand much faster. Organizations who accelerate the integration of technology into workplace will enable workers to harness technology in way that allows…[Read more]

Hey Laly, I strongly agree with you that millennials have a much deeper knowledge of digital information than the prior generations. And I believe that Audit and Assurance professions will be benefited by millennials from a technology perspective. Millennials never underestimate the willingness to embrace new technologies because they have grown…[Read more]

Hey Lezile, I agree with you that both issues go hand in hand. In today’s environment, business can’t ignore the impact of technology because information technology is a vital components to a company’s operations and growth. For example, many companies have already embracing the IT innovation like launching their phone applications, resul…[Read more]

Hey Mustafa, I like how you stated that auditors focus more on documents and are likely to create more findings that are not important. It is a good point and I never thought of that. You are right, “Less is More” and that “more” doesn’t always add value to the organisations/auditee. That kind of auditors works so hard but they don’t know what the…[Read more]